Security
Security +
Security ++
Security Age
Weird Security
100

A security operations center (SOC) analyst investigates the propagation of a memory-resident virus across the network and notices a rapid consumption of network bandwidth, causing a Denial of Service (DoS). What type of virus is this?

A worm

A virus 

A bug

A worm

100

Which of the following attacks do security professionals expose themselves to, if they do not salt passwords with a random value?

A rainbow table attack

Dictionary

Open source 


A rainbow table attack


100

An attacker performed a Distributed Denial of Service (DDoS) attack by compromising multiple zombie (agent) PCs with DoS tools. What is the control program that enables the attacker to exploit these computers to perform the DDoS attack?

A bot

100

Before installing a browser plug-in, a user accepted a 30-page license agreement which stated that their data would be monitored, and their activity would be sent to a third party. What type of software did the user install?

Adware

100

If a user's device becomes infected with crypto-malware, which of the following is the best way to mitigate this compromise?

Have up-to-date backups of the encrypted files.

200

cybersecurity received alerts about browser pop-ups. analysts discovered sites redirecting to malicious websites due to modified DNS (Domain Name System) queries. What did the computers most likely get infected with?

Spyware

200

What is a brute force attack

the password cracker tries every possible combination of characters

200

A malicious actor recently penetrated a company's network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know what was in the memory on the compromised server. Which of the following files should be given to the forensics firm?

Security 

Application

Dump

Syslog


Syslog

200

A retail executive recently accepted a job with a major competitor. The following week, a security analysis reviews the security logs and identifies successful logon attempts to access the departed executives accounts. Which of the following security practices would have addressed the issue.

Offboarding  

200

There's a company that turns dead bodies into an ocean reef.

True 

False

True 

300

High heeled shoes were originally what?

created for men

300

An attacker used an exploit to steal information from a mobile device, which allowed the attacker to circumvent the authentication process. The mobile device is vulnerable to which of the following attacks?

Bluesnarfing


300

A system administrator needs to implement an access control scheme that will allow an objects access policy to be determined by its owner. Which of the following access controls schemes BEST fits the requirements?

Discretionary access control

Remote access control 

User access control 

Discretionary access control

300

 Bubble Wrap was originally intended to be used as?

3D wallpaper

300

A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the organization's executives determine their next course of action?

Incident response plan

Communications plan 

Disaster recovery plan 

Business continuity plan

Business continuity plan

400

Under GDPR, which of the following is MOST responsible for the protection of privacy and website rights?

Data Controller

Data Owner 

Data processor 

Data Protection Officer 

Data Controller

400

A malicious user sniffed credentials exchanged between two computers by intercepting communications between them. What type of attack did the attacker execute?

A Man-in-the-Middle attack

Pushing Attack 

Open Source Attack

Trojan Attack

A Man-in-the-Middle attack

400

This almost featured the heads of famous American West heroes, like Buffalo Bill Cody, but the lead sculptor argued that the subjects should be more recognizable.

 Mount Rushmore

400

A secrity adminsitrator needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that muuiliple drives will fail simultaneously. Whcih fo the following RAID configurations should the administrator use?

RAID 0

RAID 1

RAID 5 

RAID 10

RAID 10

400

A company's Chief Information Office (CIO) is meeting with the Chief Information Security Officer (CISO) to plan some activities to enhance the skill levels of the company's developers. Which of the following would be MOST suitable for training the developers?

A capture the flag competition

A phishing simulation 

Physical security training 

Basic awareness training 

A capture the flag competition

500

A security analyst's scans and network logs show that unauthorized devices are connecting to the network. After tracing this down, the analyst discovered a tethered smartphone creating a backdoor to gain access to the network. What describes this device?


A rogue access point (AP)

500

A manager who is responsible for a data set has asked a security engineer to apply encryption to the data on a hard disk. The security engineer is an example of a:

data controller

data owner

data custodian 

data processor

data processor

500

A low level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding describes what type of attack?

Network

500

A security analyst's scans and network logs show that unauthorized devices are connecting to the network. After tracing this down, the analyst discovered a tethered smartphone creating a backdoor to gain access to the network. Which of the following describes this device?




Rogue AP

500

A public relations team will be taking a group of guests on tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboards are cleaned and all desk are cleared. teh company is MOST likely trying to protect against:


loss of proprietary information 

damage to the company's reputation

social engineering 

credential exposure

loss of proprietary information 

M
e
n
u